Authentication Server Group - D-Link xStack DES-3800 Series User Manual

Layer 3 stackable fast ethernet managed switch
Hide thumbs Also See for xStack DES-3800 Series:
Table of Contents

Advertisement

Parameter
Application
Login Method List
Enable Method List
Click Apply to implement changes made.

Authentication Server Group

This window will allow users to set up Authentication Server Groups on the Switch. A server group
is a technique used to group TACACS/XTACACS/TACACS+/RADIUS server hosts into user-defined
categories for authentication using method lists. The user may define the type of server group by
protocol or by previously defined server group. The Switch has three built-in Authentication Server
Groups that cannot be removed but can be modified. Up to eight authentications server hosts may be
added to any particular group.
To view the following window, click Security > Access Authentication Control > Authentication
Server Group:
This screen displays the Authentication Server Groups on the Switch. The Switch has three built-in
Authentication Server Groups that cannot be removed but can be modified. To modify a particular
group, click its hyperlinked Group Name, which will then display the following window.
xStack DES-3800 Series Layer 3 Stackable Fast Ethernet Managed Switch
Description
Lists the configuration applications on the Switch. The user may configure the
Login Method List and Enable Method List for authentication for users utilizing the
Console (Command Line Interface) application, the Telnet application, SSH and
the WEB (HTTP) application.
Using the pull down menu, configure an application for normal login on the user
level, utilizing a previously configured method list. The user may use the default
Method List or other Method List configured by the user. See the Login Method
Lists window, in this section, for more information.
Using the pull down menu, configure an application for normal login on the user
level, utilizing a previously configured method list. The user may use the default
Method List or other Method List configured by the user. See the Enable Method
Lists window, in this section, for more information
Figure 11- 17. Authentication Server Group Settings window
216

Advertisement

Table of Contents
loading

Table of Contents